TMH - Linux - Shadow File Injection Attack

3 years ago
49

I go through how to inject the hash of a known password into the shadow file of a Kali Linux virtual machine system using a rescue image.

Loading comments...